The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.
Abstract
In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.
The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.
Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature show its importance in strengthening financial and operationl
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreFlow unit and reservoir rock type identification in carbonates are difficult due to the intricacy of pore networks caused by facies changes and diagenetic processes. On the other hand, these classifications of rock type are necessary for understanding a reservoir and predicting its production performance in the face of any activity. The current study focuses on rock type and flow unit classification for the Mishrif reservoir in Iraq's southeast and the study is based on data from five wells that penetrate it. Integration of several methods was used to determine the flow unit based on well log interpretation and petrophysical properties. The flow units were identified using the Quality Index of Rock and the Indicator of Flow Zone. Th
... Show MoreIt is known that the oral administration of ibuprofen caused an irritation of stomach as a side effect due to its carboxylic moiety. Ibuprofen ester was synthesized by linking the carboxylic moiety of ibuprofen and the hydroxylic group of paracetamol to reduce its side effect. Study the kinetic hydrolysis of prepared ester was examined at different values of physiological pH (1.0, 5.8, 6.4 and 7.4) at 37 ± 0.1 of 1 hour period. Measurements of absorbance were carried out by UV-Visible spectrophotometer to follow the stability of ester, it showed Pseudo first order hydrolysis. The pH- apparent rate profiles of ester was exhibited a good stability at pH 1.0 and pH 5.8. Pharmacological activity in vivo of prepared ester was evaluated in re
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreThis study involves the synthesis of a new class of silicon polymers, designated as P1-P7, derived from dichlorodimethylsilane (DCDMS) in combination with various organic compounds (Schiff bases prepared from different amines and appropriate aldehydes or ketones) [I-V] through condensation polymerization. The structures of all monomers and polymers were characterization by FTIR and 1HNMR spectroscopy (for some polymers). The results of thermogravimetric analysis (TGA) and differential scanning calorimetry DSC test show stable thermal behaviour. Polymers with a higher concentration of aromatic rings in their repeating structural units exhibited a higher temperature for weight loss, indicating increased thermal stability. Thermal meas
... Show MoreThe large number of failure in electrical power plant leads to the sudden stopping of work. In some cases, the necessary reserve materials are not available for maintenance which leads to interrupt of power generation in the electrical power plant unit. The present study, deals with the determination of availability aspects of generator in unit 5 of Al-Dourra electric power plant. In order to evaluate this generator's availability performance, a wide range of studies have been conducted to gather accurate information at the level of detail considered suitable to achieve the availability analysis aim. The Weibull Distribution is used to perform the reliability analysis via Minitab 17, and Artificial Neural Networks (ANNs) by approaching o
... Show More